cis 333,strayer cis 333,strayer cis 333 complete course Flashcards
STRAYER CIS 333 Entire Course (Includes DQ’s,Assignments And 3 Sets of Final Exam)
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-entire-course-new
For more classes visit
http://www.assignmentcloud.com
CIS 333 Week 1 Discussion Providing Security Over Data NEW
CIS 333 Week 2 Discussion Risk Management and Malicious Attacks NEW
CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools NEW
CIS 333 Week 3 Case Study 1 Bring Your Own Device (BYOD) NEW
CIS 333 Week 3 Discussion Security Administration and Access Control NEW
CIS 333 Week 3 Lab 2 Performing a Vulnerability NEW
CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities NEW (2 Sets)
CIS 333 Week 4 Discussion Security Monitoring NEW
CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls NEW
CIS 333 Week 5 Discussion Business Impact Analysis (BIA) and Risk Management NEW
CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control NEW
CIS 333 Week 6 Case Study 2 Public Key Infrastructure NEW (2 Sets)
CIS 333 Week 6 Discussion Cryptography NEW
CIS 333 Week 6 Lab 5 Performing Packet Capture and Traffic Analysis NEW
CIS 333 Week 7 Discussion Network Security NEW
CIS 333 Week 7 Lab 6 Using Encryption to Enhance Confidentiality and Integrity NEW
CIS 333 Week 8 Assignment 2 Identifying Potential Risk, Response, and Recovery NEW
CIS 333 Week 8 Discussion The Impact of Malware NEW
CIS 333 Week 8 Lab 7 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities NEW
CIS 333 Week 9 Discussion Security Standards NEW
CIS 333 Week 9 Lab 8 Eliminating Threats with a Layered Security Approach NEW
CIS 333 Week 10 Discussion NEW
CIS 333 Week 10 Technical Project Paper Information Systems Security NEW
CIS 333 Week 11 Discussion 1 Course Takeaway NEW
CIS 333 Week 11 Discussion 2 Course Wrap up NEW
CIS 333 Week 11 Final Exam Set 1 NEW
CIS 333 Week 11 Final Exam Set 2 NEW
CIS 333 Week 11 Final Exam Set 3 NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-entire-course-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 1 Discussion Providing Security Over Data NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-1-discussion-providing-security-over-data-new
For more classes visit
http://www.assignmentcloud.com
- “Providing Security Over Data” Please respond to the following:
- • The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the primary means in which each of the three (3) tenets are addressed to mitigate risk and enhance security in your chosen environment.
- • The proliferation of mobile devices to create or access data has had a significant effect on the security concerns surrounding personal and corporate data. From the selected e-Activity article, summarize the attack, and determine the key ways in which you would consider mitigating the threat.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-1-discussion-providing-security-over-data-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 1 to Week 11 Discussion Question
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-1-to-week-11-discussion-question
For more classes visit
http://www.assignmentcloud.com
CIS 333 Week 1 Discussion Providing Security Over Data NEW
CIS 333 Week 2 Discussion Risk Management and Malicious Attacks NEW
CIS 333 Week 3 Discussion Security Administration and Access Control NEW
CIS 333 Week 4 Discussion Security Monitoring NEW
CIS 333 Week 5 Discussion Business Impact Analysis (BIA) and Risk Management NEW
CIS 333 Week 6 Discussion Cryptography NEW
CIS 333 Week 7 Discussion Network Security NEW
CIS 333 Week 8 Discussion The Impact of Malware NEW
CIS 333 Week 9 Discussion Security Standards NEW
CIS 333 Week 10 Discussion NEW
CIS 333 Week 11 Discussion 1 Course Takeaway NEW
CIS 333 Week 11 Discussion 2 Course Wrap up NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-1-to-week-11-discussion-question
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 2 Discussion Risk Management and Malicious Attacks NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-2-discussion-risk-management-and-malicious-attacks-new
For more classes visit
http://www.assignmentcloud.com
“Risk Management and Malicious Attacks” Please respond to the following:
• With regards to risk-response planning, there are four (4) responses to negative risks that an organization may pursue: avoid, transfer, mitigate, and accept. Develop an original and unique scenario to describe and contrast each of these responses.
• From the selected e-Activity article, describe in detail the way in which the malware was utilized to steal data or gain privileged remote access to a computer or network. Suppose you were an IT Security professional working at the attacked business, and detail the security controls that you would consider putting into practice that would help to prevent this and similar types of malware attacks moving forward.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-2-discussion-risk-management-and-malicious-attacks-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-2-lab-1-performing-reconnaissance-and-probing-using-common-tools-new
For more classes visit
http://www.assignmentcloud.com
CIS 333 Week 2 Lab 1 Performing Reconnaissance and Probing Using Common Tools NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-2-lab-1-performing-reconnaissance-and-probing-using-common-tools-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 3 Case Study 1 Bring Your Own Device (BYOD) NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-3-case-study-1-bring-your-own-device-new
For more classes visit
http://www.assignmentcloud.com
Case Study 1: Bring Your Own Device (BYOD)
Due Week 3 and worth 60 points
Read the following articles located in the course shell: “The dark side of BYOD” from TechRepublic and “BYOD As We Know It Is Dead” from Forbes.
Write a two to three (2-3) page paper in which you:
1. Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user’s overall working experience.
2. Analyze in detail the major risks surrounding BYOD, and analyze the security controls and technologies that are currently available and being utilized to manage these risks.
3. Provide a real-world example of how BYOD either positively or negatively affected an organization’s productivity and / or security.
4. Determine whether or not you would consider implementing BYOD concepts in a real organization and whether or not the benefits outweigh the risks.
5. Use at least three (3) quality resources in this assignment (no more than two to three [2-3] years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Explain how businesses apply cryptography in maintaining information security.
• Use technology and information resources to research issues in information systems security.
Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-3-case-study-1-bring-your-own-device-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 3 Discussion Security Administration and Access Control NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-3-discussion-security-administration-and-access-control-new
For more classes visit
http://www.assignmentcloud.com
“Security Administration and Access Control” Please respond to the following:
• From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability.
• Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-3-discussion-security-administration-and-access-control-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 3 Lab 2 Performing a Vulnerability NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-3-lab-2-performing-a-vulnerability-new
For more classes visit
http://www.assignmentcloud.com
CIS 333 Week 3 Lab 2 Performing a Vulnerability
Assessment Case Study 1 Bring Your Own Device (BYOD)
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-3-lab-2-performing-a-vulnerability-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 4 Assignment 1 Identifying Potential Malicious Attacks, Threats, and Vulnerabilities NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/333-week-4-assignment-1-identifying-potential-malicious-attacks,threats,and-vulnerabilities-new
For more classes visit
http://www.assignmentcloud.com
Assignment 1: Identifying Potential Malicious Attacks, Threats, and Vulnerabilities
Due Week 4 and worth 75 points
You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:
1) 2 – Firewalls 5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)
2) 1 – Web / FTP server 6) 3 – File servers
3) 1 – Microsoft Exchange Email server 7) 1 – Wireless access point (WAP)
4) 1 – Network Intrusion Detection System (NIDS) 8) 100 – Desktop / Laptop computers
9) VoIP telephone system
The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization.
Write a four to five (4-5) page paper in which you:
1. Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
2. Explain in detail the potential impact of the three (3) selected malicious attacks.
3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
4. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.
5. Explicate the potential impact of the three (3) selected concerns for data loss and data theft.
6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.
7. Use at least three (3) quality resources in this assignment (no more than two to three [2-3] years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Explain the concepts of information systems security as applied to an IT infrastructure.
• Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
• Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
• Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/333-week-4-assignment-1-identifying-potential-malicious-attacks,threats,and-vulnerabilities-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 4 Discussion Security Monitoring NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-4-discussion-security-monitoring-new
For more classes visit
http://www.assignmentcloud.com
“Security Monitoring” Please respond to the following:
• Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment.
• According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) would be more appropriate to use over the other. Provide a rationale to support your chosen example.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-4-discussion-security-monitoring-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-4-lab-3-enabling-windows-active-directory-and-user-access-controls-new
For more classes visit
http://www.assignmentcloud.com
CIS 333 Week 4 Lab 3 Enabling Windows Active Directory and User Access Controls NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-4-lab-3-enabling-windows-active-directory-and-user-access-controls-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 5 Discussion Business Impact Analysis (BIA) and Risk Management NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-5-discussion-business-impact-analysis-and-risk-management-new
For more classes visit
http://www.assignmentcloud.com
“Business Impact Analysis (BIA) and Risk Management” Please respond to the following:
• According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples to support your response.
• Compare and contrast qualitative risk analysis and quantitative risk analysis, and provide at least two (2) examples identifying a situation when each would be useful.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-5-discussion-business-impact-analysis-and-risk-management-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-5-lab-4-using-group-policy-objects-and-microsoft-baseline-security-analyzer-for-change-control-new
For more classes visit
http://www.assignmentcloud.com
CIS 333 Week 5 Lab 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-5-lab-4-using-group-policy-objects-and-microsoft-baseline-security-analyzer-for-change-control-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 6 Case Study 2 Public Key Infrastructure NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-6-case-study-2-public-key-infrastructure-new
For more classes visit
http://www.assignmentcloud.com
Case Study 2: Public Key Infrastructure
Due Week 6 and worth 60 points
Suppose you are the Information Security Director at a small software company. The organization currently utilizes a Microsoft Server 2012 Active Directory domain administered by your information security team. Mostly software developers and a relatively small number of administrative personnel comprise the remainder of the organization. You have convinced business unit leaders that it would be in the best interest of the company to use a public key infrastructure (PKI) in order to provide a framework that fosters confidentiality, integrity, authentication, and nonrepudiation. Email clients, virtual private network (VPN) products, Web server components, and domain controllers would utilize digital certificates issued by the certificate authority (CA). Additionally, the company would use digital certificates to sign software developed by the company in order to demonstrate software authenticity to the customer.
Write a two to three (2-3) page paper in which you:
1. Analyze the fundamentals of PKI, and determine the primary ways in which its features and functions could benefit your organization and its information security department.
2. Propose one (1) way in which the PKI could assist in the process of signing the company’s software, and explain the main reason why a customer could then believe that software to be authentic.
3. Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your organization. Explain your rationale.
4. Use at least three (3) quality resources in this assignment (no more than two to three [2-3] years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Explain how businesses apply cryptography in maintaining information security.
• Use technology and information resources to research issues in information systems security.
• Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-6-case-study-2-public-key-infrastructure-new
For more classes visit
http://www.assignmentcloud.com
STRAYER CIS 333 Week 6 Discussion Cryptography NEW
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-6-discussion-cryptography-new
For more classes visit
http://www.assignmentcloud.com
“Cryptography” Please respond to the following:
• Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs, formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution. If you had to select one (1) of the two (2) encryption options over the other, justify the one that you would choose, and explain your reasoning.
• From the e-Activity and your own research, give your opinion of the two (2) most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.
Check this A+ tutorial guideline at
http://www.assignmentcloud.com/cis-333-strayer/cis-333-week-6-discussion-cryptography-new
For more classes visit
http://www.assignmentcloud.com